Verifying Sensor Network Security Protocol Implementations

4.11 - 1251 ratings - Source

Verifying sensor network security protocol implementations using testing/simulation might leave some flaws undetected. Formal verification techniques have been very successful in detecting faults in security protocol specifications; however, they generally require building a formal description (model) of the protocol. Building accurate models is hard, thus hindering the application of formal verification. In this work, a framework for automating formal verification of sensor network security protocols is presented. The framework Slede extracts models from protocol implementations and verifies them against generated intruder models. Slede was evaluated by verifying two sensor network security protocol implementations. Security flaws in both protocols were detected.hoc On Demand Distance Vector) protocol [42], a loop-free routing protocol for ad
-hoc networks that guarantees that the network is always free of loops. ... The
main benefit of model checking over verification techniques like simulating using
TOSSIM and manual inspection is that the ... of the system by checking
satisfiability of the requirement through every branch of the model representing
the system.

Title

:

Verifying Sensor Network Security Protocol Implementations

Author

:

Publisher

:

ProQuest - 2008

ISBN-13

:

You must register with us as either a Registered User before you can Download this Book. You'll be greeted by a simple sign-up page.

Once you have finished the sign-up process, you will be redirected to your download Book page.